Best Practices in Network and System Administration

Size: px
Start display at page:

Download "Best Practices in Network and System Administration"

Transcription

1 Best Practices in Network and System Administration Dónal Cunningham

2 Outline Some notes on Infrastructure 10 rules to live by Network Administration System Administration Reading list/training Info

3 Infrastructure I Space Cabinets? Cages? Shared keys? Power AC only? 220V only? UPS area or in-cab? Testing? UPS death? Air Conditioning Fire supression Should people be here?

4 Infrastructure II Cable routing Label EVERYTHING (but don t trust labels blindly) Access (diversity see later)

5 Rule 1 - Be Good Citizens Visibility Ticketing system Updates must propagate outside your group Know your metrics User perception (quick response) CTO perception Partner perception Remember! System administrators and network engineers manage systems and networks on behalf of other people

6 Rule 2 - Monitor your Systems Status Establish baselines Watch trends Use the right tools for the jobs Use the right tools for your team Start in a known state!

7 Routers Link traffic Capacity CPU Memory Environmental ACL hits, BGP routes...

8 Networks Reachability Ping Traceroute Routing loops Latency Directly affects end-user perception

9 Systems Disk CPU Memory Environment Services

10 Rule 3 Perform Disaster Recovery Planning Things break. All the time. Quis custodiet ipsos custodes? If your monitoring system breaks, who will notice? Who will care? Timestamps are essential for correlation NTP is your friend NO SINGLE POINTS OF FAILURE

11 3a - Networks Redundant paths Dynamic routing minimal human intervention Spares (GBICs and cables, too ) Know your S.L.A.

12 3b - Systems Load-balancing DNS round-robin F5/Cisco Director/Resonate Global Dispatch Redundancy of service MX backups Leaf nodes should cache

13 3c - Backups No, really. That s it.

14 3d - Backups USELESS unless you have tested restores!

15 3e - Backups Remember no single points of failure? This goes for backups, too! Media fails Media devices fail Networks fail Try restoring on a different system

16 Rule 4 - It s not done until it s documented YOU are the single point of failure! You do want to go on holiday sometime, right? If not, see Rule 9

17 4a - Change Control Peer review Show others how you think Shows people what s coming Catches typos Revision Control Systems Roll-back. Say it again. Doesn t it sound good?

18 Rule 5 Establish Procedures Consistency Reproducibility ISO 9001 is all about procedures Helps to implement Rule 4 Peer review

19 Rule 6 Practise Defence in Depth Not all eggs in one basket Heterogeneity quis custodiet ipsos custodes? (Monitoring systems can fail too) You get time to react between layers Some are more important that others

20 6a - Defence in Depth Software updates OS and applications All software is buggy. Get over it. Firewall Can give false sense of security Misconfigured? Worse than no firewall. Monitor your network, too (IDS, honeypot) Internal more likely than external

21 Rule 7 - It s not done until it s tested Software installation is a risk Yes, patches too! Test systems Must the software updates be applied right now? Automate your testing, if possible

22 Rule 8 - Learn from Others Don t re-invent the wheel Save yourself time Save yourself money Mailing lists SAGE and local groups NANOG Conferences

23 8a - Other sources Vendors Sometimes they hire smart people FAQs Search engines White papers Books Articles

24 Rule 9 - Learn to Relax The Big Blue Room The most important metric - your family! DELEGATE! Go for a pint (beer, blackcurrant, whatever) Nothing messier than an exploding sysadmin...

25 Rule 10 - Non scriptum, non est If it ain t written down, it never happened Acceptable Use Policies Have all users signed them? ALL users? Including the sysadmins? Can t have perception of multi-tier system Sometimes you have to fire technical people, too

26 Rule 11 Learn how to count to 10 Thank you. Questions?

Our Server Support. Looking after your servers giving you peace of mind. Document Version 201501. Revision Date Feb 2015

Our Server Support. Looking after your servers giving you peace of mind. Document Version 201501. Revision Date Feb 2015 Our Server Support Looking after your servers giving you peace of mind. Document Version 201501. Revision Date Feb 2015 Telephone Sales and Accounts 0161 232 0001 Technical Support 0161 232 0125 Email

More information

TELE 301 Network Management

TELE 301 Network Management TELE 301 Network Management Lecture 22: Diagnostics & Ethics Haibo Zhang Computer Science, University of Otago TELE301 Lecture 22: Diagnostics & Ethics 1 Fault Management Fault management It means preventing,

More information

Troubleshooting and Maintaining Cisco IP Networks Volume 1

Troubleshooting and Maintaining Cisco IP Networks Volume 1 Troubleshooting and Maintaining Cisco IP Networks Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and E Learning Goal and Course Flow Additional Cisco Glossary of Terms Your Training

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

Cloud Service SLA Declaration

Cloud Service SLA Declaration Cloud Service SLA Declaration Basic level of support for Cloud services (SLA 1) Table of Content: 1. Definitions 2. General terms 3. Level of service warranty service functioning 4. Provider`s liability

More information

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document

More information

Your Server Support Looking after your servers, giving you peace of mind

Your Server Support Looking after your servers, giving you peace of mind Your Looking after your servers, giving you peace of mind Sales: 0370 755 5088 24x7 Dedicated support: 0370 755 5066 www.easyspace.com sales@easyspace.com Choosing the right level of support for your server.

More information

MEDIAROOM. Products Hosting Infrastructure Documentation. Introduction. Hosting Facility Overview

MEDIAROOM. Products Hosting Infrastructure Documentation. Introduction. Hosting Facility Overview MEDIAROOM Products Hosting Infrastructure Documentation Introduction The purpose of this document is to provide an overview of the hosting infrastructure used for our line of hosted Web products and provide

More information

Claudio Jeker. RIPE 41 Meeting Amsterdam, 15. January 2002. oppermann@pipeline.ch. jeker@n-r-g.com. Using BGP topology information for DNS RR sorting

Claudio Jeker. RIPE 41 Meeting Amsterdam, 15. January 2002. oppermann@pipeline.ch. jeker@n-r-g.com. Using BGP topology information for DNS RR sorting BGPDNS Using BGP topology information for DNS RR sorting a scalable way of multi-homing André Oppermann oppermann@pipeline.ch Claudio Jeker jeker@n-r-g.com RIPE 41 Meeting Amsterdam, 15. January 2002 What

More information

CHOOSING A RACKSPACE HOSTING PLATFORM

CHOOSING A RACKSPACE HOSTING PLATFORM CHOOSING A RACKSPACE HOSTING PLATFORM Rackspace has years of experience in hosting and has learnt that the unique needs of our customers businesses often determines the level of accountability and project

More information

What the student will need:

What the student will need: COMPTIA SERVER+: The Server+ course is designed to help the student take and pass the CompTIA Server+ certification exam. It consists of Book information, plus real world information a student could use

More information

Website Disaster Recovery

Website Disaster Recovery Website Disaster Recovery Contents Overview... 2 Disaster Preparedness for the Internet Age... 2 Some Fundamental Questions... 2 Planning Your Recovery... 3 Start with a Backup Plan... 4 Backup Commandments...

More information

MSP Service Matrix. Servers

MSP Service Matrix. Servers Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server

More information

NetAid Services NETENRICH. Service at a Glance. IT as a Service Offering from NetEnrich. Delivering IT as a Service

NetAid Services NETENRICH. Service at a Glance. IT as a Service Offering from NetEnrich. Delivering IT as a Service Service at a Glance The NetAid service focus goes beyond mere monitoring of network infrastructure to preventative maintenance and proactive intervention. This could be a solution for IT managers who want

More information

Best of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye

Best of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye Best of Breed of an ITIL based IT Monitoring The System Management strategy of NetEye by Georg Kostner 5/11/2012 1 IT Services and IT Service Management IT Services means provisioning of added value for

More information

Maintaining Non-Stop Services with Multi Layer Monitoring

Maintaining Non-Stop Services with Multi Layer Monitoring Maintaining Non-Stop Services with Multi Layer Monitoring Lahav Savir System Architect and CEO of Emind Systems lahavs@emindsys.com www.emindsys.com The approach Non-stop applications can t leave on their

More information

How to Make Your IDS Useful. Joel M Snyder Senior Partner Opus One jms@opus1.com

How to Make Your IDS Useful. Joel M Snyder Senior Partner Opus One jms@opus1.com How to Make Your IDS Useful Joel M Snyder Senior Partner Opus One jms@opus1.com Agenda: IDS Why are we looking at IDS? The 5 Ws of IDS Analysis The IDS Analysis Cycle 2 IDS Has Little to Do With Intrusions

More information

SEC-370. 2001, Cisco Systems, Inc. All rights reserved.

SEC-370. 2001, Cisco Systems, Inc. All rights reserved. SEC-370 2001, Cisco Systems, Inc. All rights reserved. 1 Understanding MPLS/VPN Security Issues SEC-370 Michael Behringer SEC-370 2003, Cisco Systems, Inc. All rights reserved. 3

More information

Planning and Maintaining a Microsoft Windows Server Network Infrastructure

Planning and Maintaining a Microsoft Windows Server Network Infrastructure Unit 27: Planning and Maintaining a Microsoft Windows Server Network Infrastructure Learning outcomes A candidate following a programme of learning leading to this unit will be able to: Configure security

More information

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active

More information

Missed Recovery Techniques for SQL Server By Rudy Panigas

Missed Recovery Techniques for SQL Server By Rudy Panigas Missed Recovery Techniques for SQL Server By Rudy Panigas My Bio: *Working in the IT Industry for over 25 years *Over 12 years as a Database Administrator with experience including architecting, design,

More information

Improving. Summary. gathered from. research, and. Burnout of. Whitepaper

Improving. Summary. gathered from. research, and. Burnout of. Whitepaper Whitepaper Improving Productivity and Uptime with a Tier 1 NOC Summary This paper s in depth analysis of IT support activities shows the value of segmenting and delegatingg activities based on skill level

More information

Building Success on Acquia Cloud:

Building Success on Acquia Cloud: Building Success on Acquia Cloud: 10 Layers of PaaS TECHNICAL Guide Table of Contents Executive Summary.... 3 Introducing the 10 Layers of PaaS... 4 The Foundation: Five Layers of PaaS Infrastructure...

More information

Interland Dedicated Power Server Support Guidelines

Interland Dedicated Power Server Support Guidelines Interland Dedicated Power Server Support Guidelines Interland Customer Support Version 2.2 I. Introduction This document describes how Interland provides support through its Customer Service and Support

More information

IPv6 Troubleshooting for Helpdesks

IPv6 Troubleshooting for Helpdesks IPv6 Troubleshooting for Helpdesks Using test-ipv6.com Draft v.00 Contributors and authors: Lee Howard, John Jason Brzozowski, David Freedman, Jason Fesler, Tim Chown, Sander Steffann, Chris Grundemann,

More information

Solutions as a Service N.Konstantinidis Technical Director - MNG

Solutions as a Service N.Konstantinidis Technical Director - MNG Med Nautilus Greece Connected World April 10, 2014 Solutions as a Service N.Konstantinidis Technical Director - MNG MedNautilus Greece Solutions as a Service 2014 SINCE 2002 Data Center Physical Colocation

More information

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining Intrusion Detection: Game Theory, Stochastic Processes and Data Mining Joseph Spring 7COM1028 Secure Systems Programming 1 Discussion Points Introduction Firewalls Intrusion Detection Schemes Models Stochastic

More information

Building Reliable, Scalable AR System Solutions. High-Availability. White Paper

Building Reliable, Scalable AR System Solutions. High-Availability. White Paper Building Reliable, Scalable Solutions High-Availability White Paper Introduction This paper will discuss the products, tools and strategies available for building reliable and scalable Action Request System

More information

data center - why choose a data center facility

data center - why choose a data center facility data center - why choose a data center facility Do you have the highest levels of security, redundancy, reliability, infrastructure and technical expertise necessary to operate your Internet operations?

More information

Migration Steps to Peak Hosting s AlwaysUp Architecture

Migration Steps to Peak Hosting s AlwaysUp Architecture Migration Steps to Peak Hosting s AlwaysUp Architecture When your business has outgrown your current managed hosting provider, the logical thing is to search for something better. Change can be difficult

More information

Capacity planning with Microsoft System Center

Capacity planning with Microsoft System Center Capacity planning with Microsoft System Center Mike Resseler Veeam Product Strategy Specialist, MVP, Microsoft Certified IT Professional, MCSA, MCTS, MCP Modern Data Protection Built for Virtualization

More information

Essential. Guide TESTING YOUR DISASTER RECOVERY ABILITY. The. February 2006. By Paul Robichaux

Essential. Guide TESTING YOUR DISASTER RECOVERY ABILITY. The. February 2006. By Paul Robichaux Essential The February 2006 to Guide TESTING YOUR DISASTER RECOVERY ABILITY By Paul Robichaux It doesn t matter how good your disaster recovery procedures and processes are if you don t test them. This

More information

Flash Use Cases Traditional Infrastructure vs Hyperscale

Flash Use Cases Traditional Infrastructure vs Hyperscale Flash Use Cases Traditional Infrastructure vs Hyperscale Steve Knipple, CTO / VP Engineering Atmosera : Global Hybrid Managed Services Provider Agenda Speaker Perspective The Infrastructure Market Traditional

More information

The Vital IT Protection- V.I.P. Network Support Program Overview Vital Voice & Data 888-558-8855 ext 301

The Vital IT Protection- V.I.P. Network Support Program Overview Vital Voice & Data 888-558-8855 ext 301 The Vital IT Protection- V.I.P. Network Support Program Overview Vital Voice & Data 888-558-8855 ext 301 mlongo@vitalvoiceanddata.com www.vitalvoiceanddata.com Table of Contents Proprietary Notice & Non-Disclosure

More information

Cisco Wide Area Application Services Software Version 4.1: Consolidate File and Print Servers

Cisco Wide Area Application Services Software Version 4.1: Consolidate File and Print Servers Cisco Wide Area Application Services Software Version 4.1: Consolidate File and Print Servers What You Will Learn This document describes how you can use Cisco Wide Area Application Services (WAAS) Software

More information

Network Resilience. From Concepts to Experimentation. FIRE Research Workshop - May 16 th 2011

Network Resilience. From Concepts to Experimentation. FIRE Research Workshop - May 16 th 2011 Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Resilience From Concepts to Experimentation FIRE Research Workshop - May 16 th 2011 Georg Carle, TU

More information

Lecture 2 CS 3311. An example of a middleware service: DNS Domain Name System

Lecture 2 CS 3311. An example of a middleware service: DNS Domain Name System Lecture 2 CS 3311 An example of a middleware service: DNS Domain Name System The problem Networked computers have names and IP addresses. Applications use names; IP uses for routing purposes IP addresses.

More information

Managing service delivery

Managing service delivery This White Paper describes how service delivery is managed: obtaining the required service levels and quality within agreed costs, managing performance and managing risks. The customer organization must

More information

by New Media Solutions 37 Walnut Street Wellesley, MA 02481 p 781-235-0128 f 781-235-9408 www.avitage.com Avitage IT Infrastructure Security Document

by New Media Solutions 37 Walnut Street Wellesley, MA 02481 p 781-235-0128 f 781-235-9408 www.avitage.com Avitage IT Infrastructure Security Document Avitage IT Infrastructure Security Document The purpose of this document is to detail the IT infrastructure security policies that are in place for the software and services that are hosted by Avitage.

More information

DATA CENTRE DATA CENTRE MAY 2015

DATA CENTRE DATA CENTRE MAY 2015 DATA CENTRE DATA CENTRE MAY 2015 CONCERTHOUSE MUSIC Concerthouse Music Data Centre services are located in the Equinix Internet Business Exchange (IBX ) Centre at Mascot. This IBX offers the highest level

More information

Managing and Maintaining Windows Server 2008 Servers

Managing and Maintaining Windows Server 2008 Servers Managing and Maintaining Windows Server 2008 Servers Course Number: 6430A Length: 5 Day(s) Certification Exam There are no exams associated with this course. Course Overview This five day instructor led

More information

What Makes The Large Enterprise, Large? A Network Management Perspective

What Makes The Large Enterprise, Large? A Network Management Perspective Page 1 of 7 What Makes The Large Enterprise, Large? A Network Management Perspective For large enterprises, the network management challenges don t stop with just monitoring network and receiving alerts

More information

How To Use Mindarray For Business

How To Use Mindarray For Business Minder Network Performance Monitoring Monitor everything about your Network performance Discover, visualize and monitor your complete IT Infrastructure in less than an hour. Mindarray s Minder is a powerful

More information

MCSE 2003. Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)

MCSE 2003. Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required) MCSE 2003 Microsoft Certified Systems Engineer (MCSE) candidates on the Microsoft Windows Server 2003 track are required to satisfy the following requirements: Core Exams (6 Exams Required) Four networking

More information

BGP and Traffic Engineering with Akamai. Caglar Dabanoglu Akamai Technologies AfPIF 2015, Maputo, August 25th

BGP and Traffic Engineering with Akamai. Caglar Dabanoglu Akamai Technologies AfPIF 2015, Maputo, August 25th BGP and Traffic Engineering with Akamai Caglar Dabanoglu Akamai Technologies AfPIF 2015, Maputo, August 25th AGENDA Akamai Intelligent Platform Peering with Akamai Traffic Engineering Summary Q&A The Akamai

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

DEFENSE NETWORK FAQS DATA SHEET

DEFENSE NETWORK FAQS DATA SHEET DATA SHEET VERISIGN INTERNET DEFENSE NETWORK FAQS WHAT IS A DOS OR DDOS ATTACK? A Denial of Service attack or Distributed Denial of Service attack occurs when a single host (DoS), or multiple hosts (DDoS),

More information

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division Tackling the Challenges of MPLS VPN ing Todd Law Product Manager Advanced Networks Division Agenda Background Why test MPLS VPNs anyway? ing Issues Technical Complexity and Service Provider challenges

More information

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A

More information

Datacenter Rack Switch Redundancy Models Server Access Ethernet Switch Connectivity Options

Datacenter Rack Switch Redundancy Models Server Access Ethernet Switch Connectivity Options Datacenter Rack Switch Redundancy Models Server Access Ethernet Switch Connectivity Options NANOG46 June 16, 2009 Dani Roisman droisman ~ at ~ peakwebconsulting ~ dot ~ com Introductions Slide 1 Server

More information

NetBrain Workstation Professional Edition 2.3 Release notes

NetBrain Workstation Professional Edition 2.3 Release notes NetBrain Workstation Professional Edition 2.3 Release notes Major Features...1 Known Issues*...5 NetBrain Workstation Support Site...7 Recommended System Requirements...7 Installation Notes...7 Major Features

More information

Availability and Disaster Recovery: Basic Principles

Availability and Disaster Recovery: Basic Principles Availability and Disaster Recovery: Basic Principles by Chuck Petch, WVS Senior Technical Writer At first glance availability and recovery may seem like opposites. Availability involves designing computer

More information

Studying Black Holes on the Internet with Hubble

Studying Black Holes on the Internet with Hubble Studying Black Holes on the Internet with Hubble Ethan Katz-Bassett, Harsha V. Madhyastha, John P. John, Arvind Krishnamurthy, David Wetherall, Thomas Anderson University of Washington August 2008 This

More information

THE MASTER LIST OF DNS TERMINOLOGY. First Edition

THE MASTER LIST OF DNS TERMINOLOGY. First Edition THE MASTER LIST OF DNS TERMINOLOGY First Edition DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To

More information

IT service for life science

IT service for life science anterio performs research in the field of molecular modelling including computer-aided drug design. With our experience in these fields we help customers to implement an IT infrastructure to aid these

More information

10 Tips to Better Manage Your Service Team

10 Tips to Better Manage Your Service Team 10 Tips to Better Manage Your Service Team Service Management Recurring Services Solution Development & Mgmt Marketing & Sales Project Services Service Desk Field Services Managed Services Service Desk

More information

Designing Apps for Amazon Web Services

Designing Apps for Amazon Web Services Designing Apps for Amazon Web Services Mathias Meyer, GOTO Aarhus 2011 Montag, 10. Oktober 11 Montag, 10. Oktober 11 Me infrastructure code databases @roidrage www.paperplanes.de Montag, 10. Oktober 11

More information

IT6203 Systems & Network Administration. (Optional)

IT6203 Systems & Network Administration. (Optional) Systems & Network Administration (Optional) INTRODUCTION This is one of the Optional courses designed for Semester 6 of the Bachelor of Information Technology Degree program. This course on Systems & Network

More information

THE MASTER LIST OF DNS TERMINOLOGY. v 2.0

THE MASTER LIST OF DNS TERMINOLOGY. v 2.0 THE MASTER LIST OF DNS TERMINOLOGY v 2.0 DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To help people

More information

How To Manage A Network

How To Manage A Network Network Management Keeping the Network Alive from Afar Network management is the process of documenting, monitoring, troubleshooting, and configuring network devices. Network management gives visibility

More information

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server

More information

Flexible SDN Transport Networks With Optical Circuit Switching

Flexible SDN Transport Networks With Optical Circuit Switching Flexible SDN Transport Networks With Optical Circuit Switching Multi-Layer, Multi-Vendor, Multi-Domain SDN Transport Optimization SDN AT LIGHT SPEED TM 2015 CALIENT Technologies 1 INTRODUCTION The economic

More information

Web Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING

Web Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING Web Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING Application of Terms Agreement to these terms requires agreement to Web Drive s Standard Terms & Conditions located online at the

More information

SonicWALL WAN Acceleration FAQ Document

SonicWALL WAN Acceleration FAQ Document SonicWALL WAN Acceleration FAQ Document Technology, Models, Licensing 1. What is SonicWALL s WAN Acceleration solution and how is it deployed? The SonicWALL WXA series available as live CD, Hardware and

More information

Mule Enterprise Service Bus (ESB) Hosting

Mule Enterprise Service Bus (ESB) Hosting Enterprise web solutions G7 Service Definition Mule Enterprise Service Bus (ESB) Hosting t: 0845 519 5465 e: info@axistwelve.com w: www.axistwelve.com Page 1 of 7 Table of contents Overview... 3 Service...

More information

State of Texas. TEX-AN Next Generation. NNI Plan

State of Texas. TEX-AN Next Generation. NNI Plan State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...

More information

Short Case Study: Automation, Risk Reduction, and Fail Over Routing of Imagery Products Using Multiprotocol Label Switching (MPLS) Cloud

Short Case Study: Automation, Risk Reduction, and Fail Over Routing of Imagery Products Using Multiprotocol Label Switching (MPLS) Cloud Short Case Study: Automation, Risk Reduction, and Fail Over Routing of Imagery Products Using Multiprotocol Label Switching (MPLS) Cloud Olga Aparicio & Mun-Wai Hon Ground Systems Architecture Workshop

More information

Superior Disaster Recovery with Radware s Global Server Load Balancing (GSLB) Solution

Superior Disaster Recovery with Radware s Global Server Load Balancing (GSLB) Solution Superior Disaster Recovery with Radware s Global Server Load Balancing (GSLB) Solution White Paper January 2012 Radware GSLB Solution White Paper Page 1 Table of Contents 1. EXECUTIVE SUMMARY... 3 2. GLOBAL

More information

Shared Machine Room / Service Opportunities. Bruce Campbell November, 2011

Shared Machine Room / Service Opportunities. Bruce Campbell November, 2011 Shared Machine Room / Service Opportunities Bruce Campbell November, 2011 Overview / Motivation Efficiencies Disaster Recovery First a bit about servers/storage/backups/redundancy Example: Non redundant

More information

Guardian365. Managed IT Support Services Suite

Guardian365. Managed IT Support Services Suite Guardian365 Managed IT Support Services Suite What will you get from us? Award Winning Team Deloitte Best Managed Company in 2015. Ranked in the Top 3 globally for Best Managed Service Desk by the Service

More information

Virtual Private Servers

Virtual Private Servers Virtual Private Servers Application Form Guide Internode Pty Ltd ACN: 052 008 581 150 Grenfell St Adelaide SA 5000 PH: (08) 8228 2999 FAX: (08) 8235 6999 www.internode.on.net Internode VPS Application

More information

Communications and Networking

Communications and Networking Communications and Networking History and Background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and

More information

Presentation Title: When Anti-virus Doesn t Cut it: Catching Malware with SIEM

Presentation Title: When Anti-virus Doesn t Cut it: Catching Malware with SIEM LISA 10 Speaking Proposal Category: Practice and Experience Reports Presentation Title: When Anti-virus Doesn t Cut it: Catching Malware with SIEM Proposed by/speaker: Wyman Stocks Information Security

More information

Disaster Recovery for Ingres. Abstract

Disaster Recovery for Ingres. Abstract Disaster Recovery for Ingres A general disaster recovery discussion followed by Ingres specific issues and recommendations 2002-2003 Comprehensive Consulting Solutions, Inc., All rights reserved. Abstract

More information

27 th March 2015 Istanbul, Turkey. Performance Testing Best Practice

27 th March 2015 Istanbul, Turkey. Performance Testing Best Practice 27 th March 2015 Istanbul, Turkey Performance Testing Best Practice Your Host.. Ian Molyneaux Leads the Intechnica performance team More years in IT than I care to remember Author of The Art of Application

More information

IBM AIX MANAGED SERVICES:

IBM AIX MANAGED SERVICES: IBM AIX MANAGED SERVICES: REMOTE MONITORING REMOTE ADMINISTRATION MANAGED HOSTING Reduce Your IBM AIX (pseries) Operating Costs & Get Higher Uptime. Let Connectria Help Run Your IBM AIX (pseries) Environment.

More information

Application Performance Management for Enterprise Applications

Application Performance Management for Enterprise Applications Application Performance Management for Enterprise Applications White Paper from ManageEngine Web: Email: appmanager-support@manageengine.com Table of Contents 1. Introduction 2. Types of applications used

More information

Which Backup Option is Best?

Which Backup Option is Best? Which Backup Option is Best? Which Backup Option is Best? Why Protect Your Data? Data loss disasters happen more frequently than you would think, for many different reasons: Human error and accidental

More information

Security Threat Risk Assessment: the final key piece of the PIA puzzle

Security Threat Risk Assessment: the final key piece of the PIA puzzle Security Threat Risk Assessment: the final key piece of the PIA puzzle Curtis Kore, Information Security Analyst Angela Swan, Director, Information Security Agenda Introduction Current issues The value

More information

DDoS Threat Report. Chris Beal Chief Security Architect MCNC chris.beal@mcnc.org @mcncsecurity on Twitter

DDoS Threat Report. Chris Beal Chief Security Architect MCNC chris.beal@mcnc.org @mcncsecurity on Twitter DDoS Threat Report Insights on Finding, Fighting, and Living with DDoS Attacks v1.1 Chris Beal Chief Security Architect MCNC chris.beal@mcnc.org @mcncsecurity on Twitter DDoS in the News - 2014 DDoS Trends

More information

Details. Some details on the core concepts:

Details. Some details on the core concepts: Details Some details on the core concepts: Network documentation Diagnostic tools Monitoring tools Performance tools Active and passive tools SNMP Ticket systems Configuration and change management Documentation

More information

Exchange-based email. Types of email. Why use Exchange for email?

Exchange-based email. Types of email. Why use Exchange for email? Exchange-based email Types of email POP3 Exchange Lotus Notes Squirrel mail Pine They are all pretty basic and limited except Exchange email. Lotus Notes has lots of functionality, but it s a big pain

More information

How To Handle A Power Outage On A Server Farm (For A Small Business)

How To Handle A Power Outage On A Server Farm (For A Small Business) Topic: Load balancing 4/03/2014 (c) A. Mariën 1 High Availability Key property: availability high is relative Important to determine correctly Cost of unavailability Business continuity: how long can one

More information

GoGrid Implement.com Configuring a SQL Server 2012 AlwaysOn Cluster

GoGrid Implement.com Configuring a SQL Server 2012 AlwaysOn Cluster GoGrid Implement.com Configuring a SQL Server 2012 AlwaysOn Cluster Overview This documents the SQL Server 2012 Disaster Recovery design and deployment, calling out best practices and concerns from the

More information

GE Measurement & Control. Cyber Security for NEI 08-09

GE Measurement & Control. Cyber Security for NEI 08-09 GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4

More information

The State of the Email Address. Mike Afergan Rob Beverly January 27, 2005

The State of the Email Address. Mike Afergan Rob Beverly January 27, 2005 The State of the Email Address Mike Afergan Rob Beverly January 27, 2005 Emailtester - Outline Motivation/Goals/Background Methodology Results Questions Motivation/Goals/Background Motivation Electronic

More information

Cisco Application Control Engine in the Virtual Data Center

Cisco Application Control Engine in the Virtual Data Center Cisco Application Control Engine in the Virtual Data Center Q. What is Cisco Application Control Engine (ACE) the Virtual Data Center (AVDC)? A. AVDC is a solution that focuses on integrating key data

More information

Investigating the Use of Virtual Servers to Improve the Restoration Process of an Active Directory Forest

Investigating the Use of Virtual Servers to Improve the Restoration Process of an Active Directory Forest Copyright Tom Kline, Ryan Whyms 2007 This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this

More information

LinkProof DNS Quick Start Guide

LinkProof DNS Quick Start Guide LinkProof DNS Quick Start Guide TABLE OF CONTENTS 1 INTRODUCTION...3 2 SIMPLE SCENARIO SINGLE LINKPROOF WITH EXTERNAL SOA...3 3 MODIFYING DNS ON THE EXTERNAL SOA...4 3.1 REFERRING THE A RECORD RESOLUTION

More information

Database as a Service (DaaS) Version 1.02

Database as a Service (DaaS) Version 1.02 Database as a Service (DaaS) Version 1.02 Table of Contents Database as a Service (DaaS) Overview... 4 Database as a Service (DaaS) Benefit... 4 Feature Description... 4 Database Types / Supported Versions...

More information

Remote Voting Conference

Remote Voting Conference Remote Voting Conference Logical Architecture Connectivity Central IT Infra NIST Best reachability in India for R-Voting Initiative 200+ Physical MPLS POPs across India 5 Regional Data Centre at Pune,

More information

Campus Network Best Practices: Core and Edge Networks

Campus Network Best Practices: Core and Edge Networks Campus Network Best Practices: Core and Edge Networks Dale Smith Network Startup Resource Center dsmith@nsrc.org This document is a result of work by the Network Startup Resource Center (NSRC at http://www.nsrc.org).

More information

Building Nameserver Clusters with Free Software

Building Nameserver Clusters with Free Software Building Nameserver Clusters with Free Software Joe Abley, ISC NANOG 34 Seattle, WA, USA Starting Point Discrete, single-host authoritative nameservers several (two or more) several (two or more) geographically

More information

#9011 GeoMedia WebMap Performance Analysis and Tuning (a quick guide to improving system performance)

#9011 GeoMedia WebMap Performance Analysis and Tuning (a quick guide to improving system performance) #9011 GeoMedia WebMap Performance Analysis and Tuning (a quick guide to improving system performance) Messina Thursday, 1:30 PM - 2:15 PM Paul F. Deaver, Sr. Consultant Security, Government & Infrastructure

More information

Masterkurs Rechnernetze IN2097

Masterkurs Rechnernetze IN2097 Masterkurs Rechnernetze IN2097 Advanced computer networking Internet Protocols Prof. Dr.-Ing. Georg Carle, Wolfgang Mühlbauer Chair for Network Architectures and Services Computer Science Department Technical

More information

The Trouble with Backups

The Trouble with Backups The Trouble with Backups Backups are central to any data protection strategy, but by some estimates more than half of all backups fail either in whole or in part. When you look at the reasons for why they

More information

MCSE Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring

MCSE Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring MCSE Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange

More information

IP Telephony Management

IP Telephony Management IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient

More information

California Department of Technology, Office of Technology Services AIX/LINUX PLATFORM GUIDELINE Issued: 6/27/2013 Tech.Ref No. 04.17.

California Department of Technology, Office of Technology Services AIX/LINUX PLATFORM GUIDELINE Issued: 6/27/2013 Tech.Ref No. 04.17. Table of Contents 1.0 GENERAL... 3 1.1 SUMMARY... 3 1.2 REFERENCES... 3 1.3 SUBMITTALS... 3 1.3.1 General... 3 1.3.2 Service Request Criteria... 4 1.4 EXPECTATIONS... 4 1.4.1 OTech... 4 1.4.2 Customer...

More information

The Internet Delivery Stack

The Internet Delivery Stack The Internet Delivery Stack A Framework for Successful Internet Computing and Applications January 2008, Updated September 2012 Audience Copyright Online Tech, LLC 2012 www.onlinetech.com Page 1 of 13

More information